EP0813133A2 - A uniform mechanism for using signed content - Google Patents
A uniform mechanism for using signed content Download PDFInfo
- Publication number
- EP0813133A2 EP0813133A2 EP97303445A EP97303445A EP0813133A2 EP 0813133 A2 EP0813133 A2 EP 0813133A2 EP 97303445 A EP97303445 A EP 97303445A EP 97303445 A EP97303445 A EP 97303445A EP 0813133 A2 EP0813133 A2 EP 0813133A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- content
- signed content
- signed
- signature
- computing system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000007246 mechanism Effects 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 claims description 25
- 230000008569 process Effects 0.000 claims description 14
- 230000000246 remedial effect Effects 0.000 claims description 5
- 230000001404 mediated effect Effects 0.000 abstract description 4
- 238000004519 manufacturing process Methods 0.000 abstract description 2
- 230000004044 response Effects 0.000 description 4
- VEMKTZHHVJILDY-UHFFFAOYSA-N resmethrin Chemical compound CC1(C)C(C=C(C)C)C1C(=O)OCC1=COC(CC=2C=CC=CC=2)=C1 VEMKTZHHVJILDY-UHFFFAOYSA-N 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 241000224489 Amoeba Species 0.000 description 1
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Stored Programmes (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US66168796A | 1996-06-11 | 1996-06-11 | |
US661687 | 2003-09-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
EP0813133A2 true EP0813133A2 (en) | 1997-12-17 |
Family
ID=24654682
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP97303445A Withdrawn EP0813133A2 (en) | 1996-06-11 | 1997-05-20 | A uniform mechanism for using signed content |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0813133A2 (ja) |
JP (1) | JPH1091427A (ja) |
KR (1) | KR980004060A (ja) |
TW (1) | TW313642B (ja) |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0833241A2 (en) * | 1996-09-27 | 1998-04-01 | Mitsubishi Corporation | Secure data management system |
EP0935209A2 (en) * | 1998-02-06 | 1999-08-11 | Hitachi, Ltd. | Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program |
JPH11282672A (ja) * | 1998-03-31 | 1999-10-15 | Hitachi Software Eng Co Ltd | オンラインプログラム転送方法およびオンラインプログラム実行システム |
WO1999064948A1 (en) * | 1998-06-12 | 1999-12-16 | Microsoft Corporation | Security model using restricted tokens |
EP0965917A1 (en) * | 1998-06-18 | 1999-12-22 | Sun Microsystems, Inc. | Permit for controlling access to services in protected memory systems |
EP0969366A1 (en) * | 1998-06-29 | 2000-01-05 | Sun Microsystems, Inc. | Controlling access to services between modular applications |
WO2000050978A1 (en) * | 1999-02-24 | 2000-08-31 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals |
EP1113361A1 (en) * | 2000-01-03 | 2001-07-04 | Wimba.Com S.A. | Process of communication between an applet and a local agent using a socket communication channel |
EP1132798A1 (en) * | 2000-01-18 | 2001-09-12 | Fujitsu Limited | Infomation processing apparatus and storage medium |
EP1132796A1 (en) * | 2000-03-08 | 2001-09-12 | Universite Catholique De Louvain | Mobile code and method for resource management for mobile code |
US6308273B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Method and system of security location discrimination |
US6308274B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Least privilege via restricted tokens |
WO2002006979A2 (en) * | 2000-07-13 | 2002-01-24 | Nds Limited | Configurable hardware system |
WO2002069598A2 (de) * | 2001-02-28 | 2002-09-06 | Siemens Aktiengesellschaft | Verfahren und kommunikationssystem zum bereitstellen eines programm-elements |
WO2002093361A1 (fr) * | 2001-05-14 | 2002-11-21 | Ntt Docomo, Inc. | Systeme de gestion de programme stocke dans un bloc de stockage d'un terminal mobile |
EP1262859A2 (en) * | 2001-05-30 | 2002-12-04 | Canon Kabushiki Kaisha | Information processing apparatus and method for executing software input from outside |
US6505300B2 (en) | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
WO2003100581A2 (en) * | 2002-05-28 | 2003-12-04 | Symbian Limited | Secure mobile wireless device |
US6952822B2 (en) | 2000-06-30 | 2005-10-04 | Fujitsu Limited | Program installation method, program installation system, program executing apparatus, and storage medium |
US7043454B2 (en) * | 1999-12-27 | 2006-05-09 | Pitchware, Inc. | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate idea submission, purchase and licensing and innovation transfer |
WO2007097439A1 (ja) * | 2006-02-21 | 2007-08-30 | Nec Corporation | プログラムの実行制御システム、実行制御方法、実行制御用コンピュータプログラム |
US7269445B2 (en) | 2001-01-31 | 2007-09-11 | Ntt Docomo Inc. | Method and apparatus for delivering program to storage module of mobile terminal |
GB2443708A (en) * | 2006-11-13 | 2008-05-14 | Sony Comp Entertainment Europe | DRM system which limits the duration of access to media data stored on an entertainment device |
US7730323B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Controlling database copyrights |
US7730324B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Method for controlling database copyrights |
USRE41657E1 (en) | 1994-10-27 | 2010-09-07 | Makoto Saito | Data management system |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US7827109B2 (en) | 1994-10-27 | 2010-11-02 | Makoto Saito | Digital content management system and apparatus |
USRE42163E1 (en) | 1994-04-01 | 2011-02-22 | Intarsia Software Llc | Data management system |
US7986785B2 (en) | 1994-10-27 | 2011-07-26 | Intarsia Software Llc | Data management |
US8024810B2 (en) | 1998-10-15 | 2011-09-20 | Intarsia Software Llc | Method and apparatus for protecting digital data by double re-encryption |
US8117344B2 (en) | 1996-12-13 | 2012-02-14 | Visto Corporation | Global server for authenticating access to remote services |
US8121954B2 (en) | 2004-03-12 | 2012-02-21 | Canon Kabushiki Kaisa | Information processor, method for controlling the same, and image forming system |
US8205094B2 (en) * | 2002-05-28 | 2012-06-19 | Nokia Corporation | Tamper evident removable media storing executable code |
US8352373B2 (en) | 1994-09-30 | 2013-01-08 | Intarsia Software Llc | Data copyright management system |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US8696765B2 (en) | 2002-08-09 | 2014-04-15 | Good Technology Corporation | System and method for preventing access to data on a compromised remote device |
US9141786B2 (en) | 1996-11-08 | 2015-09-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US9158829B2 (en) | 2004-10-28 | 2015-10-13 | Good Technology Software, Inc. | System and method of data security in synchronizing data with a wireless device |
US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
WO2016030404A1 (de) * | 2014-08-27 | 2016-03-03 | Bundesdruckerei Gmbh | Verfahren zur installation einer zusätzlichen applikation in einem nicht-flüchtigen speicher einer chipkarte |
US9432871B2 (en) | 2005-06-03 | 2016-08-30 | Good Technology Corporation | System and method for monitoring and maintaining a wireless device |
US10542040B2 (en) | 2014-11-17 | 2020-01-21 | Samsung Electronics Co., Ltd. | Method and apparatus for preventing injection-type attack in web-based operating system |
US10552603B2 (en) | 2000-05-17 | 2020-02-04 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
EP3021252B1 (en) * | 2014-11-17 | 2020-10-21 | Samsung Electronics Co., Ltd. | Method and apparatus for preventing injection-type attack in web-based operating system |
US20230055463A1 (en) * | 2021-08-19 | 2023-02-23 | Bank Of America Corporation | Assessment plug-in system for providing binary digitally signed results |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3586560B2 (ja) | 1998-04-28 | 2004-11-10 | シャープ株式会社 | データ処理装置 |
CA2256934C (en) | 1998-12-23 | 2002-04-02 | Hamid Bacha | System for electronic repository of data enforcing access control on data retrieval |
JP3873624B2 (ja) * | 1999-01-13 | 2007-01-24 | 株式会社日立製作所 | モバイルコードの実行方法およびそのシステム |
EP1049036A2 (en) * | 1999-04-29 | 2000-11-02 | Citibank, N.A. | System and method for web trading |
JP2001117769A (ja) * | 1999-10-20 | 2001-04-27 | Matsushita Electric Ind Co Ltd | プログラム実行装置 |
GB2364404B (en) * | 2000-07-01 | 2002-10-02 | Marconi Comm Ltd | Method of detecting malicious code |
DE10140721A1 (de) * | 2001-08-27 | 2003-03-20 | Bayerische Motoren Werke Ag | Verfahren zur Bereitstellung von Software zur Verwendung durch ein Steuergerät eines Fahrzeugs |
JP2003202929A (ja) | 2002-01-08 | 2003-07-18 | Ntt Docomo Inc | 配信方法および配信システム |
CN1992724B (zh) | 2002-04-03 | 2012-05-09 | 株式会社Ntt都科摩 | 管理服务器和终端单元 |
JP4512331B2 (ja) * | 2003-07-11 | 2010-07-28 | 株式会社リコー | カプセル化文書作成装置 |
GB2399902A (en) * | 2003-03-28 | 2004-09-29 | Hewlett Packard Development Co | Security in trusted computing systems |
JP4176533B2 (ja) | 2003-03-31 | 2008-11-05 | 株式会社エヌ・ティ・ティ・ドコモ | 端末装置及びプログラム |
US20050204182A1 (en) * | 2004-02-27 | 2005-09-15 | Smith Michael D. | Method and system for a service consumer to control applications that behave incorrectly when requesting services |
US7617397B2 (en) * | 2005-04-29 | 2009-11-10 | Microsoft Corporation | Systems and methods for generation and validation of isogeny-based signatures |
EP1967981A4 (en) * | 2005-12-27 | 2009-04-22 | Nec Corp | DEVICE, PROGRAM EXECUTION MONITORING METHOD, AND EXECUTION MONITORING PROGRAM |
JP5183517B2 (ja) * | 2009-02-05 | 2013-04-17 | 三菱電機株式会社 | 情報処理装置及びプログラム |
AU2019224247B2 (en) * | 2018-02-21 | 2021-10-21 | Ntt Docomo, Inc. | Radio communication system, security proxy device, and relay device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH047659A (ja) * | 1990-04-25 | 1992-01-13 | Toshiba Corp | 複合計算機システム |
AU683038B2 (en) * | 1993-08-10 | 1997-10-30 | Addison M. Fischer | A method for operating computers and for processing information among computers |
US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
JPH0822393A (ja) * | 1994-07-07 | 1996-01-23 | Nec Corp | 動的ローディング制御装置 |
-
1996
- 1996-10-14 TW TW085112529A patent/TW313642B/zh active
-
1997
- 1997-04-03 KR KR1019970012401A patent/KR980004060A/ko not_active Application Discontinuation
- 1997-05-20 EP EP97303445A patent/EP0813133A2/en not_active Withdrawn
- 1997-06-10 JP JP9151747A patent/JPH1091427A/ja active Pending
Cited By (95)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7730323B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Controlling database copyrights |
US8554684B2 (en) | 1994-04-01 | 2013-10-08 | Intarsia Software Llc | Controlling database copyrights |
US7979354B2 (en) | 1994-04-01 | 2011-07-12 | Intarsia Software Llc | Controlling database copyrights |
USRE42163E1 (en) | 1994-04-01 | 2011-02-22 | Intarsia Software Llc | Data management system |
US7730324B2 (en) | 1994-04-01 | 2010-06-01 | Makoto Saito | Method for controlling database copyrights |
US8352373B2 (en) | 1994-09-30 | 2013-01-08 | Intarsia Software Llc | Data copyright management system |
US8448254B2 (en) | 1994-10-27 | 2013-05-21 | Intarsia Software Llc | Digital content management system and apparatus |
USRE41657E1 (en) | 1994-10-27 | 2010-09-07 | Makoto Saito | Data management system |
US7827109B2 (en) | 1994-10-27 | 2010-11-02 | Makoto Saito | Digital content management system and apparatus |
US9245260B2 (en) | 1994-10-27 | 2016-01-26 | Xylon Llc | Data copyright management |
US7986785B2 (en) | 1994-10-27 | 2011-07-26 | Intarsia Software Llc | Data management |
USRE43599E1 (en) | 1994-10-27 | 2012-08-21 | Intarsia Software Llc | Data management system |
US8407782B2 (en) | 1994-10-27 | 2013-03-26 | Intarsia Software Llc | Data copyright management |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
EP0833241A2 (en) * | 1996-09-27 | 1998-04-01 | Mitsubishi Corporation | Secure data management system |
EP0833241A3 (en) * | 1996-09-27 | 1999-08-18 | Mitsubishi Corporation | Secure data management system |
US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US9141786B2 (en) | 1996-11-08 | 2015-09-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US9189621B2 (en) | 1996-11-08 | 2015-11-17 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US9444844B2 (en) | 1996-11-08 | 2016-09-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US8745167B2 (en) | 1996-12-13 | 2014-06-03 | Good Technology Corporation | System and method for globally and securely accessing unified information in a computer network |
US8812702B2 (en) | 1996-12-13 | 2014-08-19 | Good Technology Corporation | System and method for globally and securely accessing unified information in a computer network |
US8117344B2 (en) | 1996-12-13 | 2012-02-14 | Visto Corporation | Global server for authenticating access to remote services |
US9361603B2 (en) | 1996-12-13 | 2016-06-07 | Good Technology Corporation | System and method for globally and securely accessing unified information in a computer network |
EP0935209A3 (en) * | 1998-02-06 | 2003-12-10 | Hitachi, Ltd. | Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program |
US7856405B2 (en) | 1998-02-06 | 2010-12-21 | Hitachi, Ltd. | Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program |
EP0935209A2 (en) * | 1998-02-06 | 1999-08-11 | Hitachi, Ltd. | Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program |
US7457780B2 (en) | 1998-02-06 | 2008-11-25 | Hitachi, Ltd. | Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program |
EP1762973A3 (en) * | 1998-02-06 | 2008-03-12 | Hitachi, Ltd. | Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program |
JPH11282672A (ja) * | 1998-03-31 | 1999-10-15 | Hitachi Software Eng Co Ltd | オンラインプログラム転送方法およびオンラインプログラム実行システム |
WO1999064948A1 (en) * | 1998-06-12 | 1999-12-16 | Microsoft Corporation | Security model using restricted tokens |
US6505300B2 (en) | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6308273B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Method and system of security location discrimination |
US6308274B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Least privilege via restricted tokens |
US6279111B1 (en) | 1998-06-12 | 2001-08-21 | Microsoft Corporation | Security model using restricted tokens |
US6131165A (en) * | 1998-06-18 | 2000-10-10 | Sun Microsystems, Inc. | Permit for controlling access to services in protected memory systems |
EP0965917A1 (en) * | 1998-06-18 | 1999-12-22 | Sun Microsystems, Inc. | Permit for controlling access to services in protected memory systems |
US6256393B1 (en) | 1998-06-23 | 2001-07-03 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals |
EP0969366A1 (en) * | 1998-06-29 | 2000-01-05 | Sun Microsystems, Inc. | Controlling access to services between modular applications |
US8024810B2 (en) | 1998-10-15 | 2011-09-20 | Intarsia Software Llc | Method and apparatus for protecting digital data by double re-encryption |
WO2000050978A1 (en) * | 1999-02-24 | 2000-08-31 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals |
US8412637B2 (en) | 1999-12-27 | 2013-04-02 | Michael D. Powell | System and method to facilitate and support electronic communication of request for proposals |
US8364599B2 (en) | 1999-12-27 | 2013-01-29 | Powell Michael D | System and method to facilitate and support electronic communication of ideas |
US7043454B2 (en) * | 1999-12-27 | 2006-05-09 | Pitchware, Inc. | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate idea submission, purchase and licensing and innovation transfer |
US7672904B2 (en) | 1999-12-27 | 2010-03-02 | Powell Michael D | System and method to facilitate and support electronic communication of ideas |
US7734552B2 (en) | 1999-12-27 | 2010-06-08 | Powell Michael D | Facilitating electronic exchange of proprietary information |
US7428570B2 (en) | 2000-01-03 | 2008-09-23 | Wimba.Com S.A. | Process of communication between an applet and a local Agent using a Socket communication channel |
WO2001050258A2 (en) * | 2000-01-03 | 2001-07-12 | Wimba.Com S.A. | Process of communication between an applet and a local agent using a socket communication channel |
EP1113361A1 (en) * | 2000-01-03 | 2001-07-04 | Wimba.Com S.A. | Process of communication between an applet and a local agent using a socket communication channel |
WO2001050258A3 (en) * | 2000-01-03 | 2002-08-01 | Wimba Com S A | Process of communication between an applet and a local agent using a socket communication channel |
EP1132798A1 (en) * | 2000-01-18 | 2001-09-12 | Fujitsu Limited | Infomation processing apparatus and storage medium |
WO2001067212A1 (en) * | 2000-03-08 | 2001-09-13 | Universite Catholique De Louvain | Mobile code and method for resource management for mobile code |
EP1132796A1 (en) * | 2000-03-08 | 2001-09-12 | Universite Catholique De Louvain | Mobile code and method for resource management for mobile code |
AU2001244194B2 (en) * | 2000-03-08 | 2006-08-03 | Universite Catholique De Louvain | Mobile code and method for resource management for mobile code |
US10552603B2 (en) | 2000-05-17 | 2020-02-04 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US6952822B2 (en) | 2000-06-30 | 2005-10-04 | Fujitsu Limited | Program installation method, program installation system, program executing apparatus, and storage medium |
WO2002006979A3 (en) * | 2000-07-13 | 2002-12-12 | Nds Ltd | Configurable hardware system |
GB2382445B (en) * | 2000-07-13 | 2004-10-27 | Nds Ltd | Configurable hardware system |
WO2002006979A2 (en) * | 2000-07-13 | 2002-01-24 | Nds Limited | Configurable hardware system |
GB2382445A (en) * | 2000-07-13 | 2003-05-28 | Nds Ltd | Configurable hardware system |
US7269445B2 (en) | 2001-01-31 | 2007-09-11 | Ntt Docomo Inc. | Method and apparatus for delivering program to storage module of mobile terminal |
WO2002069598A2 (de) * | 2001-02-28 | 2002-09-06 | Siemens Aktiengesellschaft | Verfahren und kommunikationssystem zum bereitstellen eines programm-elements |
WO2002069598A3 (de) * | 2001-02-28 | 2002-11-07 | Siemens Ag | Verfahren und kommunikationssystem zum bereitstellen eines programm-elements |
US7379731B2 (en) | 2001-05-14 | 2008-05-27 | Ntt Docomo Inc. | System for managing program applications storable in a mobile terminal |
US8010095B2 (en) | 2001-05-14 | 2011-08-30 | Ntt Docomo, Inc. | System for managing program applications storable in a mobile terminal |
US8166291B2 (en) | 2001-05-14 | 2012-04-24 | Ntt Docomo, Inc. | System for managing program applications storable in a mobile terminal |
US8140846B2 (en) | 2001-05-14 | 2012-03-20 | Ntt Docomo, Inc. | System for managing program applications storable in a mobile terminal |
WO2002093361A1 (fr) * | 2001-05-14 | 2002-11-21 | Ntt Docomo, Inc. | Systeme de gestion de programme stocke dans un bloc de stockage d'un terminal mobile |
US7706786B2 (en) | 2001-05-14 | 2010-04-27 | Ntt Docomo, Inc. | System for managing program applications storable in a mobile terminal |
US7742756B2 (en) | 2001-05-14 | 2010-06-22 | Ntt Docomo, Inc. | System for managing program applications storable in a mobile terminal |
EP1262859A3 (en) * | 2001-05-30 | 2006-08-30 | Canon Kabushiki Kaisha | Information processing apparatus and method for executing software input from outside |
EP1262859A2 (en) * | 2001-05-30 | 2002-12-04 | Canon Kabushiki Kaisha | Information processing apparatus and method for executing software input from outside |
US8205094B2 (en) * | 2002-05-28 | 2012-06-19 | Nokia Corporation | Tamper evident removable media storing executable code |
WO2003100581A2 (en) * | 2002-05-28 | 2003-12-04 | Symbian Limited | Secure mobile wireless device |
EP2187285A1 (en) * | 2002-05-28 | 2010-05-19 | Nokia Corporation | Secure mobile wireless device |
US7882352B2 (en) * | 2002-05-28 | 2011-02-01 | Nokia Corporation | Secure mobile wireless device |
WO2003100581A3 (en) * | 2002-05-28 | 2004-06-03 | Symbian Ltd | Secure mobile wireless device |
US8696765B2 (en) | 2002-08-09 | 2014-04-15 | Good Technology Corporation | System and method for preventing access to data on a compromised remote device |
US11017105B2 (en) | 2002-08-09 | 2021-05-25 | Blackberry Limited | System and method for preventing access to data on a compromised remote device |
US9083707B2 (en) | 2002-08-09 | 2015-07-14 | Good Technology Corporation | System and method for preventing access to data on a compromised remote device |
US9965643B2 (en) | 2002-08-09 | 2018-05-08 | Blackberry Limited | System and method for preventing access to data on a compromised remote device |
US9672371B2 (en) | 2002-08-09 | 2017-06-06 | Good Technology Holdings Limited | System and method for preventing access to data on a compromised remote device |
US8121954B2 (en) | 2004-03-12 | 2012-02-21 | Canon Kabushiki Kaisa | Information processor, method for controlling the same, and image forming system |
US9158829B2 (en) | 2004-10-28 | 2015-10-13 | Good Technology Software, Inc. | System and method of data security in synchronizing data with a wireless device |
US9432871B2 (en) | 2005-06-03 | 2016-08-30 | Good Technology Corporation | System and method for monitoring and maintaining a wireless device |
WO2007097439A1 (ja) * | 2006-02-21 | 2007-08-30 | Nec Corporation | プログラムの実行制御システム、実行制御方法、実行制御用コンピュータプログラム |
GB2443708A (en) * | 2006-11-13 | 2008-05-14 | Sony Comp Entertainment Europe | DRM system which limits the duration of access to media data stored on an entertainment device |
GB2443708B (en) * | 2006-11-13 | 2009-01-21 | Sony Comp Entertainment Europe | A data storage device and method |
US8782418B2 (en) | 2006-11-13 | 2014-07-15 | Sony Computer Entertainment Europe Limited | Entertainment device |
WO2016030404A1 (de) * | 2014-08-27 | 2016-03-03 | Bundesdruckerei Gmbh | Verfahren zur installation einer zusätzlichen applikation in einem nicht-flüchtigen speicher einer chipkarte |
US10542040B2 (en) | 2014-11-17 | 2020-01-21 | Samsung Electronics Co., Ltd. | Method and apparatus for preventing injection-type attack in web-based operating system |
EP3021252B1 (en) * | 2014-11-17 | 2020-10-21 | Samsung Electronics Co., Ltd. | Method and apparatus for preventing injection-type attack in web-based operating system |
US20230055463A1 (en) * | 2021-08-19 | 2023-02-23 | Bank Of America Corporation | Assessment plug-in system for providing binary digitally signed results |
US11893116B2 (en) * | 2021-08-19 | 2024-02-06 | Bank Of America Corporation | Assessment plug-in system for providing binary digitally signed results |
Also Published As
Publication number | Publication date |
---|---|
TW313642B (en) | 1997-08-21 |
KR980004060A (ko) | 1998-03-30 |
JPH1091427A (ja) | 1998-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0813133A2 (en) | A uniform mechanism for using signed content | |
US5978484A (en) | System and method for safety distributing executable objects | |
US10263987B2 (en) | Techniques for sharing virtual machine (VM) resources | |
US10382426B2 (en) | Authentication context transfer for accessing computing resources via single sign-on with single use access tokens | |
US8505083B2 (en) | Remote resources single sign on | |
US6189103B1 (en) | Authority delegation with secure operating system queues | |
US6167522A (en) | Method and apparatus for providing security for servers executing application programs received via a network | |
US8887250B2 (en) | Techniques for accessing desktop applications using federated identity | |
US5825877A (en) | Support for portable trusted software | |
EP2316095B1 (en) | Licensing protected content to application sets | |
US7545931B2 (en) | Protection of application secrets | |
US20050120199A1 (en) | Distributed dynamic security for document collaboration | |
US8131997B2 (en) | Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel | |
US8990896B2 (en) | Extensible mechanism for securing objects using claims | |
US20040010714A1 (en) | Authenticating legacy service via web technology | |
Karnik et al. | A security architecture for mobile agents in Ajanta | |
US20090089881A1 (en) | Methods of licensing software programs and protecting them from unauthorized use | |
US8387152B2 (en) | Attested content protection | |
US7376975B2 (en) | Enhancing digital rights management system security through policy enforcement | |
US9129098B2 (en) | Methods of protecting software programs from unauthorized use | |
Islam et al. | A flexible security system for using Internet content | |
US20060248578A1 (en) | Method, system, and program product for connecting a client to a network | |
Schiffman et al. | DAuth: Fine-grained authorization delegation for distributed web application consumers | |
US20230179591A1 (en) | Mechanism of common authentication for both supervisor and guest clusters | |
Anand et al. | A flexible security model for using Internet content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): DE FR GB |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Withdrawal date: 20001026 |